The practice of agile methodologies can lead to the creation, communication, and consumption of different types of knowledge. For appropriate (re)use, there is a need to manage such knowledge effectively. In this paper, a framework comprising of related conceptual models as means for understanding the use of Wiki for managing knowledge in agile software development is proposed. In doing so, Wiki is placed in a larger context of the Social Web environment, illustrative examples are given, and implications of committing to a Wiki are highlighted.
{"title":"Towards Understanding the Use of Wiki in Agile Software Development","authors":"Pankaj Kamthan","doi":"10.1109/WAINA.2014.93","DOIUrl":"https://doi.org/10.1109/WAINA.2014.93","url":null,"abstract":"The practice of agile methodologies can lead to the creation, communication, and consumption of different types of knowledge. For appropriate (re)use, there is a need to manage such knowledge effectively. In this paper, a framework comprising of related conceptual models as means for understanding the use of Wiki for managing knowledge in agile software development is proposed. In doing so, Wiki is placed in a larger context of the Social Web environment, illustrative examples are given, and implications of committing to a Wiki are highlighted.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"574 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116379084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tomoyuki Ishida, Y. Shimizu, K. Takahagi, Akira Sakuraba, Noriki Uchida, Y. Shibata
In this research, we build the system which can gather safety information to the disaster countermeasures headquarters by adjusting refugees information quickly in the evacuation centers at the time of wide-scale disaster. In this system, use of the personal number card issued by social security number program is assumed. Using this personal number card, the refugees information is registered into the Refugees Personal Information DB Server. The registered refugees information is gathered by the disaster countermeasures headquarters, and evacuation center information is publicized from each local government. By practical use of this research, at the time of wide-scale disaster like the Great East Japan Earthquake, this system realizes quick gathering of refugees information. Relief supplies can be correctly rationed to each evacuation center by the disaster countermeasures headquarters grasps refugees detailed information.
{"title":"Construction of Integrated Safety Confirmation System Using the IC Card","authors":"Tomoyuki Ishida, Y. Shimizu, K. Takahagi, Akira Sakuraba, Noriki Uchida, Y. Shibata","doi":"10.1109/WAINA.2014.98","DOIUrl":"https://doi.org/10.1109/WAINA.2014.98","url":null,"abstract":"In this research, we build the system which can gather safety information to the disaster countermeasures headquarters by adjusting refugees information quickly in the evacuation centers at the time of wide-scale disaster. In this system, use of the personal number card issued by social security number program is assumed. Using this personal number card, the refugees information is registered into the Refugees Personal Information DB Server. The registered refugees information is gathered by the disaster countermeasures headquarters, and evacuation center information is publicized from each local government. By practical use of this research, at the time of wide-scale disaster like the Great East Japan Earthquake, this system realizes quick gathering of refugees information. Relief supplies can be correctly rationed to each evacuation center by the disaster countermeasures headquarters grasps refugees detailed information.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115137382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Endo, André Vitor de Almeida Palhares, M. Santos, G. Gonçalves, D. Sadok, J. Kelner, A. Sefidcon, F. Wuhib
Resource management in distributed environments, such as Cloud virtualized networks, is one of the main concerns of infrastructure providers. Despite many advantages of centralized solutions (such as the facility of implementation and management), their unique point of failure and the lack of scalability make us consider the use of distributed and autonomic solutions. Beyond this, centralized solutions would be inefficient to deal with dynamic and peak situations. By using simple sets of rules, each autonomic node can independently act and react according to scenario's changes without the knowledge of the whole system status, making autonomic management robust and adaptable. The main goal of this paper is to describe a role-based autonomic mechanism - called Role-Based Self-Appointment (RBSA) - for resource management in distributed environments and its applicability in different scenarios.
{"title":"Role-Based Self-Appointment for Autonomic Management of Resources","authors":"P. Endo, André Vitor de Almeida Palhares, M. Santos, G. Gonçalves, D. Sadok, J. Kelner, A. Sefidcon, F. Wuhib","doi":"10.1109/WAINA.2014.113","DOIUrl":"https://doi.org/10.1109/WAINA.2014.113","url":null,"abstract":"Resource management in distributed environments, such as Cloud virtualized networks, is one of the main concerns of infrastructure providers. Despite many advantages of centralized solutions (such as the facility of implementation and management), their unique point of failure and the lack of scalability make us consider the use of distributed and autonomic solutions. Beyond this, centralized solutions would be inefficient to deal with dynamic and peak situations. By using simple sets of rules, each autonomic node can independently act and react according to scenario's changes without the knowledge of the whole system status, making autonomic management robust and adaptable. The main goal of this paper is to describe a role-based autonomic mechanism - called Role-Based Self-Appointment (RBSA) - for resource management in distributed environments and its applicability in different scenarios.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114906676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In mobile sensor networks (MSNs), since sensor nodes and wireless networks are highly resource constrained, it is required to manage sensor data in flexible and efficient manners. Under the MEXT research project entitled "Studies on Efficient Data Processing Techniques for Mobile Sensor Networks," we have conducted researches on data management issues in MSNs. In this paper, we report some of our achievements in a sub-area of this project, which addresses data allocation for efficient query processing in MSNs. In particular, we first show our achievements on how to effectively allocate sensor data on mobile nodes and how to efficiently process top-k and k-nearest neighbor queries on the allocated data. Then, we also show our achievements on how to quantify the impacts of mobility on data availability and data dissemination in MSNs.
{"title":"Data Allocation Techniques for Mobile Sensor Networks","authors":"T. Hara, S. Nishio","doi":"10.1109/WAINA.2014.43","DOIUrl":"https://doi.org/10.1109/WAINA.2014.43","url":null,"abstract":"In mobile sensor networks (MSNs), since sensor nodes and wireless networks are highly resource constrained, it is required to manage sensor data in flexible and efficient manners. Under the MEXT research project entitled \"Studies on Efficient Data Processing Techniques for Mobile Sensor Networks,\" we have conducted researches on data management issues in MSNs. In this paper, we report some of our achievements in a sub-area of this project, which addresses data allocation for efficient query processing in MSNs. In particular, we first show our achievements on how to effectively allocate sensor data on mobile nodes and how to efficiently process top-k and k-nearest neighbor queries on the allocated data. Then, we also show our achievements on how to quantify the impacts of mobility on data availability and data dissemination in MSNs.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125775145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cloud computing has gained a momentum by combining multi-tenant and scalable services in order to obtain a composed service and some added value. Therefore, it is important for composed cloud services to support multi-tenancy during the services matching. For this purpose, we tackle the problem of integrating multi-tenancy in cloud services composition and we determine crucial issues that can be solved. To do this, we propose a multi-tenant aware services composition approach to facilitate the dynamic services matching at run-time. This research is based on service patterns which are used within the composition process for integrating multi-tenancy architecture and reducing the difficulty of cloud services matching. Furthermore, we propose a middleware layer (Composition as a Service) for implementing our approach into conventional cloud architecture. The performed evaluation proves the efficiency of our approach for services based applications in the cloud computing.
{"title":"Towards a Multi-tenancy Aware Cloud Service Composition","authors":"Wael Sellami, Hatem Hadj Kacem, A. Kacem","doi":"10.1109/WAINA.2014.71","DOIUrl":"https://doi.org/10.1109/WAINA.2014.71","url":null,"abstract":"Cloud computing has gained a momentum by combining multi-tenant and scalable services in order to obtain a composed service and some added value. Therefore, it is important for composed cloud services to support multi-tenancy during the services matching. For this purpose, we tackle the problem of integrating multi-tenancy in cloud services composition and we determine crucial issues that can be solved. To do this, we propose a multi-tenant aware services composition approach to facilitate the dynamic services matching at run-time. This research is based on service patterns which are used within the composition process for integrating multi-tenancy architecture and reducing the difficulty of cloud services matching. Furthermore, we propose a middleware layer (Composition as a Service) for implementing our approach into conventional cloud architecture. The performed evaluation proves the efficiency of our approach for services based applications in the cloud computing.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126732043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In recent years, Cloud technology has revolutionized the way services are delivered to end-users. The advent of truly mobile computing in the form of smart phones and tablets has also driven the demand for Cloud resources in order to compensate for the inherent lack of local resources on these devices. Furthermore, modern mobile devices are equipped with multiple network interfaces and in combination with the rapid deployment of wireless networks, it is expected that they will always have Internet connectivity and access to Cloud resources. In this paper we will focus on traffic management for interactive multimedia services accessed by a mobile user by means of dynamic migration of a Virtual Machine. Network performance measurements are taken from a network of virtualization-enabled hosts that perform live migrations of a Virtual Machine which hosts multimedia content. The data is used as input to an equation that determines whether a migration would be beneficial in terms of traffic localization based on a user's mobility characteristics and network usage patterns. The contribution of this paper lies in the proposed mechanism of managing traffic for interactive services in the context of mobile cloud computing. This helps alleviate the increased network costs introduced by dynamic migrations driven by Quality of Service parameters and may result in increased network traffic for the benefit of improved QoS.
{"title":"Dynamic Edge-Caching for Mobile Users: Minimising Inter-AS traffic by Moving Cloud Services and VMs","authors":"Fragkiskos Sardis, G. Mapp, J. Loo, Mahdi Aiash","doi":"10.1109/WAINA.2014.32","DOIUrl":"https://doi.org/10.1109/WAINA.2014.32","url":null,"abstract":"In recent years, Cloud technology has revolutionized the way services are delivered to end-users. The advent of truly mobile computing in the form of smart phones and tablets has also driven the demand for Cloud resources in order to compensate for the inherent lack of local resources on these devices. Furthermore, modern mobile devices are equipped with multiple network interfaces and in combination with the rapid deployment of wireless networks, it is expected that they will always have Internet connectivity and access to Cloud resources. In this paper we will focus on traffic management for interactive multimedia services accessed by a mobile user by means of dynamic migration of a Virtual Machine. Network performance measurements are taken from a network of virtualization-enabled hosts that perform live migrations of a Virtual Machine which hosts multimedia content. The data is used as input to an equation that determines whether a migration would be beneficial in terms of traffic localization based on a user's mobility characteristics and network usage patterns. The contribution of this paper lies in the proposed mechanism of managing traffic for interactive services in the context of mobile cloud computing. This helps alleviate the increased network costs introduced by dynamic migrations driven by Quality of Service parameters and may result in increased network traffic for the benefit of improved QoS.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121765108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper a new transmission control protocol named IISS for active RFID networks is proposed that utilizes the concept of scanning the network for successful and unsuccessful slots using lesser number of bits (compared to ISO/IEC 18000-7 standard), a new technique to adjust counters on the tags, decreased number of bits to set the protocol parameters (Frame Length and Slot Size) and reduced size of empty slots within collection rounds. This new protocol is an improved version of previously invented protocol called ISS. The results show that in comparison to the ISO 18000-7, IISS decreases the total read time by 71%, 44% and 28% when 16, 50 and 100 bytes of data are read from the tags respectively.
{"title":"A New Transmission Control Protocol for Active RFID Networks","authors":"F. Baloch, R. Pendse","doi":"10.1109/WAINA.2014.80","DOIUrl":"https://doi.org/10.1109/WAINA.2014.80","url":null,"abstract":"In this paper a new transmission control protocol named IISS for active RFID networks is proposed that utilizes the concept of scanning the network for successful and unsuccessful slots using lesser number of bits (compared to ISO/IEC 18000-7 standard), a new technique to adjust counters on the tags, decreased number of bits to set the protocol parameters (Frame Length and Slot Size) and reduced size of empty slots within collection rounds. This new protocol is an improved version of previously invented protocol called ISS. The results show that in comparison to the ISO 18000-7, IISS decreases the total read time by 71%, 44% and 28% when 16, 50 and 100 bytes of data are read from the tags respectively.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"1 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123294120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper describes our ongoing effort to develop an efficient and scalable infrastructure to model and simulate near-field tsunamis in order to develop site-specific impact scenarios (e.g. the expected effects of the tsunami on land). Our goal is to be able to leverage this infrastructure in order to provide the necessary information to assist emergency planning, notification and response programs. Our primary focus is to produce the scenario information quickly by efficiently utilizing the available hardware, providing as much lead-time as possible for the response systems. We have been able to show that a distributed computing approach allows for parallel computation of simulations, resulting in shorter times between the occurrence of an event and the simulated output. Included in this paper is our proposed computational model, a summary of our infrastructure and an evaluation of our proposed distributed framework.
{"title":"Parallel Infrastructures and Systems for Near-Field Tsunami Detection and Impact Assessment","authors":"Y. Yazir, J. Erickson, Y. Coady","doi":"10.1109/WAINA.2014.143","DOIUrl":"https://doi.org/10.1109/WAINA.2014.143","url":null,"abstract":"This paper describes our ongoing effort to develop an efficient and scalable infrastructure to model and simulate near-field tsunamis in order to develop site-specific impact scenarios (e.g. the expected effects of the tsunami on land). Our goal is to be able to leverage this infrastructure in order to provide the necessary information to assist emergency planning, notification and response programs. Our primary focus is to produce the scenario information quickly by efficiently utilizing the available hardware, providing as much lead-time as possible for the response systems. We have been able to show that a distributed computing approach allows for parallel computation of simulations, resulting in shorter times between the occurrence of an event and the simulated output. Included in this paper is our proposed computational model, a summary of our infrastructure and an evaluation of our proposed distributed framework.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126430475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we propose an electricity (power) reduction method in a home (house). The proposed method assumes sensor networks which consist of smart taps, temperature sensors, light sensors, sleeping detection sensors, and human detection sensors. Furthermore, we made a modeling of the sensor networks and developed a simulation system to verify an effectiveness of the proposed method. From the evaluation by simulation, we verified effectiveness of the proposed method.
{"title":"A Proposal and Evaluation of Electricity Reduction Method in Home","authors":"Takaya Okamoto, A. Koyama","doi":"10.1109/WAINA.2014.94","DOIUrl":"https://doi.org/10.1109/WAINA.2014.94","url":null,"abstract":"In this paper, we propose an electricity (power) reduction method in a home (house). The proposed method assumes sensor networks which consist of smart taps, temperature sensors, light sensors, sleeping detection sensors, and human detection sensors. Furthermore, we made a modeling of the sensor networks and developed a simulation system to verify an effectiveness of the proposed method. From the evaluation by simulation, we verified effectiveness of the proposed method.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131889680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
GitHub is a popular platform for collaboration on open source projects. It also provides a rich API to query various aspects of the public activity. This combination of a popular social coding website with a rich API presents an opportunity for researchers to gather empirical data about software development practices. There are an overwhelmingly large number of competing platforms to choose from in software development. Knowing which are gaining widespread adoption is valuable both for individual developers trying to increase their employability, as well as software engineers deciding which technology to use in their next big project. In terms of a developer's employability and an employer's ability to find available developers in their economic region, it is important to identify the most common technologies by geographic location. In this paper, analyses are done on GitHub data taking into account the developers' location and their technology usage. A web-based tool has been developed to interact with and visualize this data. In its current state of development, the tool summarizes the amount of code developers have in their public repositories broken down by programming language, and summarizes data about programmers using specific programming languages. This allows website visitors to get an immediate picture of the programming language usage in their region of interest. Future research could expand this work to technologies beyond programming languages such as frameworks and libraries.
{"title":"Location-Based Analysis of Developers and Technologies on GitHub","authors":"David Rusk, Y. Coady","doi":"10.1109/WAINA.2014.110","DOIUrl":"https://doi.org/10.1109/WAINA.2014.110","url":null,"abstract":"GitHub is a popular platform for collaboration on open source projects. It also provides a rich API to query various aspects of the public activity. This combination of a popular social coding website with a rich API presents an opportunity for researchers to gather empirical data about software development practices. There are an overwhelmingly large number of competing platforms to choose from in software development. Knowing which are gaining widespread adoption is valuable both for individual developers trying to increase their employability, as well as software engineers deciding which technology to use in their next big project. In terms of a developer's employability and an employer's ability to find available developers in their economic region, it is important to identify the most common technologies by geographic location. In this paper, analyses are done on GitHub data taking into account the developers' location and their technology usage. A web-based tool has been developed to interact with and visualize this data. In its current state of development, the tool summarizes the amount of code developers have in their public repositories broken down by programming language, and summarizes data about programmers using specific programming languages. This allows website visitors to get an immediate picture of the programming language usage in their region of interest. Future research could expand this work to technologies beyond programming languages such as frameworks and libraries.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"25 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120896515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}